Skip to main content

The covert set-cover problem with application to Network Discovery

Item Preview

SIMILAR ITEMS (based on metadata)
Arxiv.org
texts
eye 22
favorite 0
comment 0
Source: http://arxiv.org/abs/1104.0733v1
Arxiv.org
by Yoshiharu Maeno
texts
eye 27
favorite 0
comment 0
Source: http://arxiv.org/abs/0710.4975v2
Arxiv.org
by Martin Furer; Huiwen Yu
texts
eye 29
favorite 0
comment 0
Source: http://arxiv.org/abs/1109.3418v1
Arxiv.org
texts
eye 26
favorite 0
comment 0
Source: http://arxiv.org/abs/1011.4028v4
Arxiv.org
by Rashmisnata Acharyya; Manjanna B.; Gautam K. Das
texts
eye 40
favorite 0
comment 0
Source: http://arxiv.org/abs/1209.2951v1
Arxiv.org
by Amotz Bar-Noy; Ben Baumer; Dror Rawitz
texts
eye 26
favorite 0
comment 0
Source: http://arxiv.org/abs/1204.1082v2
Arxiv.org
texts
eye 31
favorite 0
comment 0
Source: http://arxiv.org/abs/0807.3326v1
Arxiv.org
texts
eye 53
favorite 0
comment 0
Source: http://arxiv.org/abs/1111.4299v2
Arxiv.org
by Martin Skutella; David P. Williamson
texts
eye 87
favorite 0
comment 0
Source: http://arxiv.org/abs/1107.2033v1
Arxiv.org
by Chandra Chekuri; Kenneth L. Clarkson; Sariel Har-Peled
texts
eye 40
favorite 0
comment 0
Source: http://arxiv.org/abs/0909.0537v1